Exam Collection Dumps And New Questions

QUESTION 31The Chief Executive Officer (CEO) of a corporation decided to move all email to a cloud computing environment.The Chief Information Security Officer (CISO) was told to research the risk involved in this environment.Which of the following measures should be implemented to minimize the risk of hosting email in the cloud?

A. Remind users that all emails with sensitive information need be encrypted and physicallyinspect the cloud computing.B. Ensure logins are over an encrypted channel and obtain an NDA and an SLA from thecloud provider.C. Ensure logins are over an encrypted channel and remind users to encrypt all emails thatcontain sensitive information.D. Obtain an NDA from the cloud provider and remind users that all emails with sensitiveinformation need be encrypted.

Answer: B

QUESTION 32Due to a new regulation, a company has to increase active monitoring of security-related events to 24 hours a day.The security staff only has three full time employees that work during normal business hours. Instead of hiring new security analysts to cover the remaining shifts necessary to meet the monitoring requirement, the Chief Information Officer (CIO) has hired a Managed Security Service (MSS) to monitor events.Which of the following should the company do to ensure that the chosen MSS meets expectations?

A. Develop a memorandum of understanding on what the MSS is responsible to provide.B. Create internal metrics to track MSS performance.C. Establish a mutually agreed upon service level agreement.D. Issue a RFP to ensure the MSS follows guidelines.

Answer: C

QUESTION 33A system administrator needs to develop a policy for when an application server is no longer needed.Which of the following policies would need to be developed?

QUESTION 34After a security incident, an administrator revokes the SSL certificate for their web server www.company.com.Later, users begin to inform the help desk that a few other servers are generating certificate errors: ftp.company.com, mail.company.com, and partners.company.com.Which of the following is MOST likely the reason for this?

A. Each of the servers used the same EV certificate.B. The servers used a wildcard certificate.C. The web server was the CA for the domain.D. Revoking a certificate can only be done at the domain level.

Answer: B

QUESTION 35A wholesaler has decided to increase revenue streams by selling direct to the public through an on-line system.Initially this will be run as a short term trial and if profitable, will be expanded and form part of the day to day business.The risk manager has raised two main business risks for the initial trial:

1. IT staff has no experience with establishing and managing secure on-line credit card processing.2. An internal credit card processing system will expose the business to additional compliance requirements.

Which of the following is the BEST risk mitigation strategy?

A. Transfer the risks to another internal department, who have more resources to accept therisk.B. Accept the risks and log acceptance in the risk register.Once the risks have been accepted close them out.C. Transfer the initial risks by outsourcing payment processing to a third party service provider.D. Mitigate the risks by hiring additional IT staff with the appropriate experience andcertifications.

Answer: C

QUESTION 36An administrator notices the following file in the Linux server’s /tmp directory.

-rwsr-xr-x. 4 root root 234223 Jun 6 22:52 bash*

Which of the following should be done to prevent further attacks of this nature?

A. Never mount the /tmp directory over NFSB. Stop the rpcidmapd service from runningC. Mount all tmp directories nosuid, noexecD. Restrict access to the /tmp directory

Answer: C

QUESTION 37Company GHI consolidated their network distribution so twelve network VLANs would be available over dual fiber links to a modular L2 switch in each of the company’s six IDFs.The IDF modular switches have redundant switch fabrics and power supplies.Which of the following threats will have the GREATEST impact on the network and what is the appropriate remediation step?

QUESTION 38Within an organization, there is a known lack of governance for solution designs.As a result there are inconsistencies and varying levels of quality for the artifacts that are produced.Which of the following will help BEST improve this situation?

A. Ensure that those producing solution artifacts are reminded at the next team meeting thatquality is important.B. Introduce a peer review process that is mandatory before a document can be officiallymade final.C. Introduce a peer review and presentation process that includes a review board with representation from relevant disciplines.D. Ensure that appropriate representation from each relevant discipline approves of the solution documents before official approval.

Answer: C

QUESTION 39An administrator of a secure web server has several clients with top security clearance and prefers security over performance.By default, which of the following cipher suites would provide strong security, but at the same time the worst performance?

A. 3DES-SHAB. DES-MD5C. Camellia-SHAD. RC4-MD5

Answer: A

QUESTION 40Corporate policy states that the systems administrator should not be present during system audits.The security policy that states this is:

QUESTION 31In which of the following testing methodologies do assessors use all available documentation and work under no constraints, and attempt to circumvent the security features of an information system?

QUESTION 37A project team member has just identified a new project risk. The risk event is determined to have significant impact but a low probability in the project. Should the risk event happen it’ll cause the project to be delayed by three weeks, which will cause new risk in the project. What should the project manager do with the risk event?

A. Add the identified risk to a quality control management control chart.B. Add the identified risk to the risk register.C. Add the identified risk to the issues log.D. Add the identified risk to the low-level risk watchlist.

Answer: B

QUESTION 38Which of the following concepts represent the three fundamental principles of information security?Each correct answer represents a complete solution. Choose three.

QUESTION 40Your organization has a project that is expected to last 20 months but the customer would really like the project completed in 18 months. You have worked on similar projects in the past and believe that you could fast track the project and reach the 18 month deadline. What increases when you fast track a project?

A. Balancing clients across APs on different channels within the same bandB. Encourages clients, 5GHz capable, to connect on the 5GHz spectrumC. Coordinate access to the same channel across multiple APsD. Enables selection of 20 vs. 40 MHz mode of operation per bandE. Enables acceptable coverage index on both the “b/g” and “a” spectrums Read More …

A. Because IT solutions are going through a trend of decreasing costs.B. Because business requirements are changing rapidly.C. Because the technology led change is too expensive.D. Because of the disruption created by the megatrends: cloud, mobility, big data, video.

Answer: BC

QUESTION 32Which three options are the main areas where customers will see the benefits for their investment? (Choose three.)

A. DemandB. PayrollC. OperationsD. SupplyE. Business

Answer: ADE

QUESTION 33What two elements should be considered in an investment case? (Choose two.)

QUESTION 35Which option can assist with determining technology requirements arising from a customer initiative to implement a business process improvement?

A. Create a Use Case diagram to model the improved business process and from this determine what technology is required.B. Use the Business Motivation Model to analyze business and technology requirements for a given initiative.C. Undertake an Ishikawa Analysis to determine root causes and determine how technology can resolve these issues.D. Perform a gap analysis between “as-is” and “to-be” states to determine what technology will be required.

Answer: D

QUESTION 36When would you say your customer has adopted a solution?

A. When they purchase the solution from the Cisco partner.B. When the solution is deployed.C. When the solution is deployed and there has been one year with no operating issues.D. When the solution is deployed, features and options are activated, and customer is realizing the benefits of your value proposition.

Answer: D

QUESTION 37Which option is a benefit of technology adoption?

A. Customer realizes the benefits stated by Cisco and the partner during the negotiation phase.B. Customer gets to replace their old systems and solutions.C. Adoption increases sales.D. Customer pays only when the technology is adopted.

Answer: A

QUESTION 38Why is it important for the customer to communicate the plan to deploy an IT solution to his or her organization?

A. So that the CEO approves the deployment.B. So that the Cisco Partner can claim the Software Activation promotion credits.C. Because communicating gives the IT organization more relevancy.D. Because communicating provides the organization with a vision of the benefits and an expectation to realize the results.

QUESTION 40Which three options are the purpose of change management? (Choose three.)

A. To guarantee risks related to the business need disappear.B. To help increase the adoption of the technology solution.C. To ensure that standardized methods and procedures are used for efficient and prompt handling of all changes.D. To guarantee business risk is managed and minimized.E. To ensure that all authorized changes support business needs and goals.

QUESTION 31Which three options are considerations you have to take into account when communicating the business outcomes story? (Choose three.)

A. Be aware of people’s time and length of presentation.B. Organize the presentation so that the message is clear and key points emerge early.C. Prepare carefully the agenda and the objectives definitions.D. Use the right verbal and corporate language.E. Know your audience and what is of interest to them.

Answer: ABE

QUESTION 32Which option is the most effective way to use best practices or scenarios during the selling process?

A. in use cases that are relevant to the customerB. in business cases used previouslyC. in customer briefing documentsD. in customer benefits statements

Answer: A

QUESTION 33Why is it convenient to tie business outcomes and the customer value proposition?

A. Because it accelerates the time to market of new products and solutions while maintaining a reasonable cost structure.B. Because this way you can establish fixed business goals and priorities and facilitate the deployment project management.C. To reduce complexity for stakeholders, it is easier for them to describe the benefits and to influence others to gain support.D. Because it keeps the value proposition unchanged, it is easier for stakeholders to claim for accountability.

Answer: C

QUESTION 34Which option is the main element of a Business Outcomes storyline?

QUESTION 35Which options are two benefits of understanding the customer’s business model? (Choose two.)

A. Understanding the customer’s business model changes the way you interact with your customer.B. Understanding the customer’s business model provides control and assessment of project challenges.C. Understanding the customer’s business model helps track progress through outcomes.D. Understanding the customer’s business model is used to address the sales force mindset.

Answer: AC

QUESTION 36You are working to understand a customer business environment. Which two options are preferred data gathering techniques? (Choose two.)

A. Understand the goals of the buyer.B. Focus on Cisco technologies already in place.C. Focus on fulfilling customer needs and help them generate value through stronger business outcomes.D. Pay attention to details that the customer is sharing about their needs.

Answer: C

QUESTION 38Cisco solutions and services are related to every kind of outcomes. What approach is frequently used to achieve business outcomes?

A. Using Next Generation IT to increase service quality. Also, reducing risk, complexity and costsB. Refining, enriching or developing & enabling new business processes, new markets, and customer interactionsC. Taking advantage of new technology to increase business relevanceD. Improving agility & ability to create or deploy high quality, differentiated, innovative services for end users

QUESTION 31Consider the process that begins with file retrospection, continues to interrogate the file and update its disposition over time, then records the pathway that the software and files take from device to device. This process is an example of which Cisco AMP feature?

QUESTION 71Cisco Finesse supports the use of custom call variable layouts. How does the agent desktop determine which layout to use?

A. The name of the layout is passed to the agent desktop via a keyword variable that is named user layout.B. The layout is associated to the team under Team Resources.C. The layout is associated to the CSQ definition.D. The layout is associated to the desktop layout under Team Resources.

QUESTION 31Your customer wants to configure LSCs and asks for specific information about which number to configure in the text box right next to the “Number of Attempts”. Which statement is true?

A. The default number of attempts is 100.B. A value of 2 means that if an AP fails to join the Cisco WLC using an LSC, the AP attempts to Join the Cisco WLC using the default certificateC. A value of 255 means that if an AP fails to join the Cisco WLC using an LSC,the AP does not attempt to join the Cisco WLC using the default .D. A value of 3 means that if a user fails to authenticate,the user is disconnected after three retries. Read More …

QUESTION 31Cisco IOS XR software is partitioned into three planes: control, data, and management. Which three of these belong to the data plane? (Choose three.)

A. XMLB. RIBC. FIBD. QoSE. PFI

Answer: CDE

QUESTION 32A network engineer is responsible for implementing a solution with Cisco IOS XR Software that insures continuous forwarding during a control plane failure. Which two technologies should the engineer consider? (Choose two.)

QUESTION 33What are three main characteristics of mLDP that differ from RSVP-TE? (Choose three.)

A. The LSPs are built from tailend to headend.B. The LSPs are built from headend to tailend.C. It supports only P2MP LSPs.D. It supports both P2MP and MP2MP LSPs.E. Signaling is periodic.F. No periodic signaling is performed.

QUESTION 34Which are the two purposes of the MPLS label value 1? (Choose two.)

A. it is used for MPLS OAM packets.B. it indicates an implicit null label.C. it is used for VPNv6 packets.D. it is used to carry the QoS value in the label stack.E. it indicates an explicit null label.F. it indicates a router alert label.

Answer: AFExplanation:A value of 1 represents the “Router Alert Label”. When a received packet contains this label value at the top of the label stack, it is delivered to a local software module for processing. The actual packet forwarding is determined by the label beneath it in the stack. However, if the packet is forwarded further, the Router Alert Label should be pushed back onto the label stack before forwarding. The use of this label is analogous to the use of the “Router Alert Option” in IP packets (for example, ping with record route option)http://www.cisco.com/c/en/us/support/docs/multiprotocol-label-switching-mpls/mpls/4649-mpls-faq-4649.html

QUESTION 35Refer the exhibit. Two Autonomous Systems are enabled to support multicast. An engineer wants to set up configuration so that a multicast client at AS 100 can receive multicast traffic from the M-Server at AS 200. However, the RP announcements must be limited within each autonomous system site. Which Cisco IOS configuration achieves this goal?

A. On both ASBRs Eth0/0 and the no ip pim sparse-mode command.B. On both ASBRs add the ip pim send-rp-discovery scope 1 command.C. On both RPs add the ip pim send-rp-discovery scope 2 command.D. On both ASBRs Eth0/0 and the ip pim bsr-border command.E. On both ASBRs Eth0/0 and the ip pim dense-mode command.F. On both RPs add the ip pim bsr-border command.

QUESTION 37In a Layer 2 VPN service, which is the default behavior of an EVC-based platform with regards to VLAN manipulation?

A. keeps the VLAN tag of the incoming frameB. attaches two VLAN tags to the incoming frameC. removes the VLAN tag from the incoming frameD. removes all the VLAN tags from the incoming frameE. sets the VLAN tag of the incoming frame

A. Clusters are used in confederation schemes to avoid loops.B. BGP network can have a confederation within a route reflector area.C. An internal BGP network cannot have a route reflector within a confederation.D. An internal BGP network can have a route reflector within a confederation.E. Clusters are used in route reflector schemes to avoid loops.F. BGP network cannot have a confederation within a route reflector area.

QUESTION 43Refer to the exhibit. Which IPv6 OSPF network type is applied to interface Fa0/0 of R2 by default?

A. broadcastB. EthernetC. multipointD. point-to-point

Answer: A

QUESTION 44Which option describes the characteristics of a public Infrastructure as a Serveice cloud service model?

A. It is a way of delivering cloud-computing infrastructure (servers, storage, network, and operating systems) as an on-demand service.B. It is a cloud service where the underlying hardware is managed by the cloud service provider.C. It is a cloud-computing platform that facilitates the creation of web applications without the need to maintain the supporting software applications.D. It is a cloud-computing platform that facilitates the creation of web applications without the need to maintain the supporting software operating systems.

Answer: A

QUESTION 45Which effect of configuring the passive-interface S0/0 command under the EIGRP routing process is true?

A. It prevents EIGRP neighbor relationships from being formed over interface S0/0.B. It configures interface S0/0 to send hello packets with the passive-interface bit set.C. It configures interface S0/0 to suppress all outgoing routing updates.D. It configures interface S0/0 to reject all incoming routing updates.

Answer: A

QUESTION 46What is the default IS-IS interface metric on a Cisco router?

A. 255B. 64C. 10D. 128

Answer: C

QUESTION 47Which two items must be defined to capture packet data with the Embedded Packet Capture feature? (Choose two.)

A. Use “passive-interface default” under the routing process.B. Enable passive-interface on interface configuration.C. passive interface are not supported in RIPng.D. Enable passive-interface for each interface under the routing process.

Answer: C

QUESTION 50Which statement is true about IGMP?

A. Multicast sources send IGMP messages to their first-hop router, which then generates a PIM join message that is then sent to the RP.B. Multicast receivers send IGMP messages to their first-hop router, which then forwards the IGMP messages to the RP.C. IGMP messages are encapsulated in PIM register messages and sent to the RP.D. Multicast receivers send IGMP messages to signal their interest to receive traffic for specific multicast groups.